An X.Org security advisory
It turn out that the X.org server, versions 1.19.0 and after, contain aneasily exploitable privilege escalation vulnerability. Anybody who isrunning a system that has X installed setuid root, and which has untrustedusers on it, will want to install the update. "X.Org recommends theuse of a display manager to start X sessions, which does not require Xorgto be installed setuid."